• Title/Summary/Keyword: concealment

Search Result 345, Processing Time 0.026 seconds

A Study of Multiple Compression for Malicious Code Execution and Concealment (악성코드 실행과 은닉을 위한 다중 압축 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.299-302
    • /
    • 2010
  • Recently, the malicious code is not easily detectable in the vaccine for the virus, malicious code as a compressed file by modulation pattern is the tendency to delay. Among the many antivirus engines on the market a compressed file that can be modulated by malicious code, and test whether the pattern will need to know. We cover a multi-compressed files, malicious code modulated secreted by examining patterns of test engine is being detected is through a computer simulation. Analysis of secreted activities of malicious code and infect the host file tampering with the system driver files and registry, it gets registered is analyzed. this study will contribute hidden malicious code inspection and enhance vaccine efficacy in reducing the damage caused by malicious code.

  • PDF

Error-Resilient Video Transmission Techniques over Unreliable Networks (비 신뢰성 네트워크에서 에러를 극복하는 비디오 전송 기법)

  • 노경택
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.50-55
    • /
    • 2001
  • We review error resilience techniques for real-time video transport over unreliable networks. For error control on the source coding level, each decoder has to make provisions for error detection, resynchronization. and error concealment. and we review techniques suitable for that purpose. Further, techniques are discussed for intelligent processing of acknowledgment information by the coding control to adapt the source coder to the channel. We review and compare error tracking, error confinement. and reference picture selection techniques for channel-adaptive source coding. We review how feedback-based source codings are related with the precompressed video stored on a media server

  • PDF

Characteristics of Infrared Blocking, Stealth and Color Difference of Aluminum Sputtered Fabrics

  • Han, Hye Ree
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.4
    • /
    • pp.592-604
    • /
    • 2019
  • This study examines the stealth function of sputtered fabric with an infrared thermal imaging camera in terms of the thermal and infrared (IR) transmittance characteristics. Various base fabrics were selected, infrared imaging was performed, and infrared transmittance was measured. By infrared camera experiment it was found that the sample was concealed because it had a similar color to the surroundings when the aluminum layer was directed toward the outside. In addition, a comparison of the infrared thermographic image of the untreated sample and the sputtered sample in the laboratory showed that the difference in ${\Delta}E$ value ranged from 31 to 90.4 and demonstrated effective concealment. However, concealment was not observed in the case of the 3-layer (Nylon-Al-Nylon) model when a sputtered aluminum layer existed between two nylon layers. The direction of the sputtering layer did not affect the infrared transmittance in the infrared transmittance experiment. Therefore, it seems better to interpret the concealing effect in the infrared thermographic images by using thermal transfer theory rather than infrared transmittance theory. We believe that the results of this study will be applicable to developing high performance smart clothing and military uniforms.

Content Adaptive Pattern Concealment for Nonintrusive Projection-based AR (비간섭 프로젝션 기반 증강현실을 위한 컨텐츠 적응형 패턴 은닉)

  • Park, Han-Hoon;Lee, Moon-Hyun;Seo, Byung-Kuk;Jin, Yoon-Jong;Park, Jong-Il
    • Journal of the HCI Society of Korea
    • /
    • v.2 no.1
    • /
    • pp.49-56
    • /
    • 2007
  • A nonintrusive projection-based AR approach using complementary pattern has been recently proposed and applied to virtual studio. However, the approach faces the tradeoff between the pattern imperceptibility and compensation accuracy. To alleviate the tradeoff, we propose a content adaptive pattern concealment approach. The projector input images (AR images) are divided into rectangular regions and spatial variation and color distribution are computed in the regions. Based on the spatial variation and color distribution, we embed locally different strength of pattern images into different color channels. It is demonstrated that the proposed approach has two opposite advantages by comparing it with the previous (non-adaptive) approach through a variety of experiments and subjective evaluation. Our content adaptive approach can obtain the same performance using weaker pattern than the previous approach and thus significantly improve the imperceptibility of the pattern. On the contrary, our content adaptive approach can make strong pattern less perceptible and thus produce better compensation results.

  • PDF

The Effect of an Emotional Factor on User Experience with Smartphone Unlocking Process (스마트 폰 잠금 해제 과정에서의 감성적 UX 요소가 전반적 기기 사용 경험과 향후 사용 의도에 미치는 영향)

  • Lee, Sunhwa;Shin, Youngsoo;Im, Chaerin;Beak, Hannah;Lee, Sungho;Kim, Jinwoo
    • Science of Emotion and Sensibility
    • /
    • v.17 no.4
    • /
    • pp.79-88
    • /
    • 2014
  • Smart-phones have become a vital part of our lives, paying a bill online, shopping using applications, using email and office applications. Therefore, the risk of the leakage of personal informations and the misuse of them becomes high, for the cost of loosing smart-phone. Many types of smart-phone security features such as password, slide-lock, and pattern lock have been introduced. However, those security locks make users not to easily access and use a smart-phone. There is tradeoff between security on one hand, and usability and cost on the other. This paper propose Self-Concealment to solve the tradeoff problem and demonstrate the effect through the experiment. In sum, Self-Concealment lowers smart-phone experience; however increases smart-phone use intension. This paper has implication for proposing new User Experience (UX) construct to resolve the trade-off between security and usability.

Colorectal Cancer Concealment Predicts a Poor Survival: A Retrospective Study

  • Li, Xiao-Pan;Xie, Zhen-Yu;Fu, Yi-Fei;Yang, Chen;Hao, Li-Peng;Yang, Li-Ming;Zhang, Mei-Yu;Li, Xiao-Li;Feng, Li-Li;Yan, Bei;Sun, Qiao
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.7
    • /
    • pp.4157-4160
    • /
    • 2013
  • Objectives: Understanding the situation of cancer awareness which doctors give to patients might lead to prognostic prediction in cases of of colorectal cancer (CRC). Methods: Subsets of 10,779 CRC patients were used to screen the risk factors from the Cancer Registry in Pudong New Area in cancer awareness, age, TNM stage, and gender. Survival of the patients was calculated by the Kaplan-Meier method and assessed by Cox regression analysis. The views of cancer awareness in doctors and patients were surveyed by telephone or household. Results: After a median observation time of 1,616 days (ranging from 0 to 4,083 days) of 10,779 available patients, 2,596 of the 4,561 patients with cancer awareness survived, whereas 2,258 of the 5,469 patients without cancer awareness and 406 of the 749 patients without information on cancer awareness died of the disease. All-cause and cancer-specific survival were poorer for the patients without cancer awareness than those with (P < 0.001 for each, log-rank test). Cox multivariate regression analysis showed that cancer concealment cases had significantly lower cancer-specific survival (hazard ratio (HR) = 1.299; 95 % confidence interval (CI): 1.200-1.407)and all-cause survival (HR = 1.324; 95 % CI: 1.227-1.428). Furthermore, attitudes of cancer awareness between doctors and patients were significantly different (P < 0.001). Conclusion: Cancer concealment, not only late-stage tumor and age, is associated with a poor survival of CRC patients.

Studies on the Nest site Selection and Characteristics of Habitat use of Long-tailed Tits Aegithalos caudatus in Korea (한국에서 번식하는 오목눈이의 둥지장소 선택과 서식지 이용 특성)

  • Baek, Chung-yeol;Lee, Jin-hee;No, Sun-ho;Jang, Kyung-Hee;Cho, Sam-rae
    • Korean Journal of Environment and Ecology
    • /
    • v.30 no.5
    • /
    • pp.829-836
    • /
    • 2016
  • This study was carried out on Kongju National University and its neighboring area, Mt. Gyeryong national park and Mt. Worak national park in the breeding season of long-tailed tits Aegithalos caudaatus from 2008 to 2012. The result of the inquiry, the nests were found in 15 species of trees, and this result shows me it's not choosy about them. But after having classified them according to the features and analyzed them, long-tailed tits preferred evergreen needleleaf tree and deciduous broad-leaf tree and deciduous bush, especially evergreen needleleaf tree. The concealment rate of long-tailed tits' nests was $11.61{\pm}4.79%]\;4.38{\pm}2.19%$(n=29) in Kongju National University and it's neighboring area, $6.06{\pm}2.31%$(n=43) in Mt. Gyeryong national park and $4.38{\pm}2.19%$(n=32) in Mt. Worak national park. By regional groups, the concealment rates of neighboring nests were almost same, but there are no differences among the areas. The average of the color codes was $26.52{\pm}16.14$(n=32) that those of the nest subtract from those of surroundings of the nest. The nests were procryptic according to their surroundings, and if their nest in a tree were evergreen needleleaf trees, they were made of moss. while if the trees of nest in a tree were yellow because of fungus, made of dried moss, they were yellow, too.

Error Concealment Technique Using Motion Vectors of Neighboring Block (주변 블록의 움직임 벡터를 이용한 에러 은닉 기법)

  • 김승종;성해경
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.1-5
    • /
    • 2001
  • 네트워크를 통한 영상 데이터 전송 시 에러가 발생하면 복원 영상의 화질 열화는 매우 심각하다. 따라서, 에러 영상을 복원하기 위한 에러 은닉 기술은 복호기 쪽에 매우 중요하다. 본 논문에서는 매크로블록이 움직임 벡터와 함께 손상이 되었을 때 주변 매크로블록의 움직임 벡터를 이용한 빠르고 효율적인 에러 은닉 기법을 제안한다. 실험 결과 에러 은닉 기법을 제안한다. 실험 결과 에러 블록 주변의 경계화소를 이용한 기존의 방법과 비교하여 거의 동등한 복원 화질을 얻으면서도 에러 은닉을 위한 처리 시간을 획기적으로 단축하였다.

  • PDF

Realtime Marker Concealment using Patch-based Texture Synthesis (패치 기반 텍스쳐 합성을 활용한 실시간 마커 은닉)

  • Yun, Kyung-Dahm;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.96-102
    • /
    • 2007
  • 본 논문에서는 자연스러운 증강현실 환경을 위하여 패치 기반의 텍스쳐 합성을 통한 마커 은닉 방법을 제안한다. 증강현실에서 카메라의 자세를 구하기 위한 보편적인 방법은 음영 대비가 뚜렷한 정사각형의 마커를 사용하는 것이다. 이러한 인위적인 마커의 사용은 물체의 인식과 추적을 용이하게 하지만 증강된 장면의 실감성을 감소시켜 사용성 저하를 유발하기도 한다. 제안된 마커 은닉 방법은 실시간성을 보장하면서, 배경 텍스쳐의 전역적인 특성을 유지하고, 주변 환경의 변화에 유연하다.

  • PDF